Security Problem In Wireless Network Computer Science Essay

Published:

This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

The aim of this project is to understand a major Security Problem in Wireless Network Eavesdropping. To achieve this aim a critical examination of the problem and examining possible solutions for understanding and avoiding this major security problem will be necessary.

Wireless Networks became a critical part of our life's and everyone needs to think how their security will prevent unauthorized attacks on their networks and to their lives. Basically everyone now can intercept to any wireless network easily with the right equipment and knowledge .This is major Security problem because Wireless networks are becoming more and more popular with as a result the security of the networks remain outdated and attackers find easier ways to intercept to our networks and steal our personal data. Simple steps to secure your network and prevent eavesdropping :First of all install a firewall to the device you are using . Firewalls are the maximum security against users that they will try to access your device. Secondly Changing your SSID name and password will prevent the attacker for getting easily to your network. And for the next step use one of the following solutions mentioned below.

Eavesdropping.jpg

Solutions:

WEP:

WEP or Wired Equivalent Privacy is a based encryption algorithm with a secret key of 40 bits or 104 bits being combined with a 24-bit Initialisation Vector(IV) (Guillaume Lehembre,2005).WEP has been designed for security to encrypt data .The IV is the key to WEP security (Guillaume Lehembre,2005).WEP keys can be found behind your SSID device .If the admin of the wireless network turn off WEP everyone will be able to join your network. Unfortunately WEP vulnerabilities were exploited by such security tools as AirSnort, allowing WEP keys to be recovered by analysing a sufficient amount of traffic (Guillaume Lehembre,2005).Cracking a WEP key can be done almost by anyone ,also attackers can bypass the WEP in several minutes Cracking tools like Aircrack by Christophe Devine or WepLab by José Ignacio Sánchez implement these attacks and can recover a 128-bit WEP key in less than 10 minutes (Guillaume Lehembre,2005)and if they gather enough data they may could produce their own key. If the WEP key is stolen in a home or a small business you can change it without causing any problems but in the other hand the damage will be critical if this scenario happens to a large enterprise company . The only good thing about the WEP is that most of the attackers who will try to join your network if they see a WEP key they may be discouraged and try to have access in another network.

WPA:

The Wi-Fi Protected Access (WPA) is a standards-based interoperable security specification(Stanley wong,2003).WPA is using a Temporal key Integrity Protocol or else TKIP in addition WEP security to be upgraded adding new measures in WEPS security problem. They also apply strong network access control ,better key management (TKIP),apply new security technologies (EAP,802.1x),

In the other hand performance will be greatly reduced because of more complex encryption protocols and TKIP encryption weaknesses may appear

802.11i

The 802.11i specification is a solution that IEEE 802.11 committee designs to target the security problems created by the WEP. The 802.11 Task Group "I" has been spending more than two years on the specification and three drafts have been released ever since(Stanley wong,2003).802.11i maybe the best wireless security solution and many researches show that will replace WEP and WPA. With more features such as stronger encryption algorithms, better message integrity with the same authentication as WPA. The only disadvantage 802.11i has a hardware upgrade will be necessary in order to work AES(Advance Encryption Standard).

MAC address:

All wireless routers have a feature called MAC address usually is turned off because its difficult to set up .An address is an identifier which is unique within the particular computing network to identify each device associated with the network .Such addresses may be unique to only a particular network environment (Ballard C. Bare ,2003).In case someone is trying to intercept your network knowing also your SSID and some encryption keys MAC address will prevent the interception and the attacker from your network. Where a plurality of network switches cooperate through load balancing protocols to enable simultaneous use of multiple paths between, protocols of present invention newly discovered MAC addresses attached to ports of an edge to be disseminated through the network switches (Ballard C. Bare ,2003).A good hacker can break into your wireless network configuring the client of your MAC address .Having enable MAC address you prevent most of the attackers which in that case is everyone from connecting into your network .

Vpn:

Vpn servers are one of the most secure network traffic organizations over the internet also they provide a mechanism for encapsulating and encoding network traffic and move into another network here are point to point connection between user and a server. Vpn servers Can be used in many ways:

1) An office network connects to another network using router to router connection

2)A user connects to a private network remotely on the internet using vpn .

VPNs and the associated infrastructure must be properly secured & maintained and they do not protect users from many attacks in wireless networks

OpenVpn: Are the newest version of VPN and there are more secure for all the networks. Also OpenVpn don't suffer from complexity like other Vpn Servers and that's because they have SSL/TLS mechanisms for better encryption. James Yonan research brought the insight that there were two main streams in VPN technology, one promoting security and the other, usability. None of the solutions available at that time offered an ideal blend of both objectives. IPSec and all of its implementations were difficult to set up, but offered acceptable security(Markus Feilner,2006).OpenVPN has only a few weaknesses which the most important is IPSec but OpenVPN has a lot more features and that is increasing the level of his security.

Mysolution

Writing Services

Essay Writing
Service

Find out how the very best essay writing service can help you accomplish more and achieve higher marks today.

Assignment Writing Service

From complicated assignments to tricky tasks, our experts can tackle virtually any question thrown at them.

Dissertation Writing Service

A dissertation (also known as a thesis or research project) is probably the most important piece of work for any student! From full dissertations to individual chapters, we’re on hand to support you.

Coursework Writing Service

Our expert qualified writers can help you get your coursework right first time, every time.

Dissertation Proposal Service

The first step to completing a dissertation is to create a proposal that talks about what you wish to do. Our experts can design suitable methodologies - perfect to help you get started with a dissertation.

Report Writing
Service

Reports for any audience. Perfectly structured, professionally written, and tailored to suit your exact requirements.

Essay Skeleton Answer Service

If you’re just looking for some help to get started on an essay, our outline service provides you with a perfect essay plan.

Marking & Proofreading Service

Not sure if your work is hitting the mark? Struggling to get feedback from your lecturer? Our premium marking service was created just for you - get the feedback you deserve now.

Exam Revision
Service

Exams can be one of the most stressful experiences you’ll ever have! Revision is key, and we’re here to help. With custom created revision notes and exam answers, you’ll never feel underprepared again.